General
-
Target
12112024_0003_Solicitud de cotizaci�n 11-11-2024�pdf.vbs.zip
-
Size
46KB
-
Sample
241112-acdeqazenc
-
MD5
c2a8a46ac8037c5b0c48a3fd5db2eeb2
-
SHA1
111756633ca7cba48161365b8fbdf1018a63dbd4
-
SHA256
9939124470b905a59211785f33e22b3761829b7cacd89bb03d7104f4c71a8d72
-
SHA512
18bf5375cbd7b6bc7f875f6c51240c60fc570e5bbce23c8b64a8beeaa7f98065f544b9c2f1fd6d0a26c76597ed7803a1c658ddff72fb89df8f095769715d4544
-
SSDEEP
768:GMPP9RF6V8Ojabor58j4FnjU0dbJj3cbTsPa93gf4Z2oEKIOATyzZu0Y7ad7HQ6f:GMX9RiabA3FnjpdbJbgTJ3CsYKSTAZz/
Static task
static1
Behavioral task
behavioral1
Sample
Solicitud de cotización 11-11-2024·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solicitud de cotización 11-11-2024·pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
RemoteHost
t-vw8qw3d.duckdns.org:23458
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-OFN57D
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Solicitud de cotización 11-11-2024·pdf.vbs
-
Size
85KB
-
MD5
e56ac816d58f9404f4dcdf20eaefc4e3
-
SHA1
9e326579cf5f7fab3a13c7151263699247ec6c30
-
SHA256
906ce7810e3b4d1729d3a5c3044af98b5447c0137c742476fa769df801fc843e
-
SHA512
4d0b34a417df2d245a5c633ce5feb426780a11104773eca9b9ec1766a14ddd6d35f1fd96b26eb32e973d5688166376c041c63b659a8ee253348466acbfb7a936
-
SSDEEP
1536:670tE9G0kixGd9papuoNHMqJ5uXsjJqPkKk/Qf/YugT1VBXaAj2abf:6Qa9GhAU9sh5u8sPQ/Qf/YuYVBzbf
-
Remcos family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2